Sciweavers


Publication
335views
12 years 1 months ago
Person Re-Identification: What Features are Important?
State-of-the-art person re-identi cation methods seek robust person matching through combining various feature types. Often, these features are implicitly assigned with a single ve...
Chunxiao Liu, Shaogang Gong, Chen Change Loy, Xing...

0
posts
with
0
views
233profile views
jaewleeProfessor, Assistant
Sungkyunkwan University
jaewlee
INFOCOM
2012
IEEE
12 years 9 months ago
Expected loss bounds for authentication in constrained channels
We derive bounds on the expected loss for authentication protocols in channels which are constrained due to noisy conditions and communication costs. This is motivated by a numbe...
Christos Dimitrakakis, Aikaterini Mitrokotsa, Serg...

Publication
283views
12 years 10 months ago
Security and Surveillance
Human eyes are highly efficient devices for scanning through a large quantity of low-level visual sensory data and delivering selective information to one’s brain for high-level...
Shaogang Gong, Chen Change Loy, Tao Xiang
ICASSP
2011
IEEE
13 years 3 months ago
Analysis of the security of linear blinding techniques from an information theoretical point of view
We propose a novel model to characterize the security of linear blinding techniques. The proposed model relates the security of blinding to the possibility of estimating the blind...
Tiziano Bianchi, Alessandro Piva, Mauro Barni
HPCA
2011
IEEE
13 years 3 months ago
Architectural framework for supporting operating system survivability
The ever increasing size and complexity of Operating System (OS) kernel code bring an inevitable increase in the number of security vulnerabilities that can be exploited by attack...
Xiaowei Jiang, Yan Solihin
HICSS
2011
IEEE
203views Biometrics» more  HICSS 2011»
13 years 3 months ago
Will HITECH Heal Patient Data Hemorrhages?
Hemorrhages of confidential patient health data create privacy and security concerns. While the US HIPAA legislation on privacy and security went into effect over five years ago, ...
M. Eric Johnson, Nicholas D. Willey
HICSS
2011
IEEE
190views Biometrics» more  HICSS 2011»
13 years 3 months ago
Validating Cyber Security Requirements: A Case Study
Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, securit...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
HICSS
2011
IEEE
247views Biometrics» more  HICSS 2011»
13 years 3 months ago
Model-Driven Development Meets Security: An Evaluation of Current Approaches
Although our society is critically dependent on software systems, these systems are mainly secured by protection mechanisms during operation instead of considering security issues...
Kresimir Kasal, Johannes Heurix, Thomas Neubauer

0
posts
with
0
views
203profile views
pravallikareddy